Not able to capture 4 way handshake using airodump-ng

I am not able capture 4 way handshake, I also tried manually disconnecting and reconnecting my device to the network in hope that airodump-ng will capture the handshake but no luck. I checked the device was successfully getting disconnected after sending deauthentication packets, and gets automatically reconnected the moment I stop sending the packets. I am using Kali 2020.2 in VirtualBox. My Wifi adapter is TP-Link TL-WN722N(V3) with Realtek rtl8188eus chipset. Also one weird thing I noticed, deauthentication attacks do not work everytime, it only works roughly 1 out of 5 times and discovering networks around me take 30-40 seconds. I tried reinstalling VirtualBox and Kali Linux, still no improvement.

Commands that I am using

  • airodump-ng –bssid (bssid of router) –channel (channel number) –write handshk wlan0
  • aireplay-ng –deauth 32 -a (bssid of router) -c (target client) wlan0

I can see the captured packets in handshk.cap file but no handshake is being detected by aircrack-ng.

Result of aircrack-ng

root@kali:~# aircrack-ng handshk-01.cap -w test.txt  Reading packets, please wait... Opening handshk-01.cap Read 2180918 packets.          BSSID                 ESSID               Encryption  1 (bssid of router)   (name of the network)   WPA (0 handshake)   Choosing first network as target.   Reading packets, please wait... Opening handshk-01.cap Read 2180918 packets.   1 potential targets   Packets contained no EAPOL data; unable to process this AP.     Quitting aircrack-ng...